We are proud to announce a new version of Manta Tools: 3.6! Let’s just sum it up real quick.
Most of our customers have complex data warehouses. Some of them are running on two or more different technologies (Informatica and Teradata combo is the most common example). Manta Flow has improved its capability to show everything going on, even in those mixed-technology warehouses. The visualization itself was also improved – now it is possible to preview the source code of the script depicted by a specific node.
We are also launching a new demo – the existing Manta Checker online demo is getting a new sibling – the Manta Flow demo, which allows you to try the product before even getting in touch with us. You can try any function you want – the only limit in the online version is one script of reasonable size (up to 50 kB!) per visualization, so everyone can use it at once. The full version is, of course, unlimited.
Dynamic data flows in Teradata and Informatica PowerCenter are now even easier to understand – you can limit their granularity and explore them further than ever before. It used to be smoke and mirrors – some kind of data flows appears to lead somewhere, but in reality it is not, because of conditions not detectable by standard analysis. And last, but not least, Manta Checker has been developed a little more too. It now works even better with Manta Flow, and those two tools are a great combo for a data warehouse in any level of complexity.Do you have any questions or comments? Just let us know using the form on the right or by emailing us directly. Also, do not forget to follow us on Twitter and subscribe to our feed.

MANTA is the central hub of all data flows in an organization, and with its lineage capabilities, it enables digital transformation. The platform allows information users to understand how data flows through all their systems and delivers actionable intelligence to boost governance efforts, accelerate development, shorten time-to-market, speed up the modernization process, ensure data quality, and enforce data security.